News about Oracle's Solaris and Sun Hardware
System News
Dec 10th, 2012 — Dec 16th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 178, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Database Insider - December 2012 Issue Available Now
Feature Articles, Webcasts, Podcasts, Videos -- A Rich Resource for DB Users

Both an overview of and a link to Database Insider -- December 2012 Issue are provided in a post by Javier Puerta, who draws attention to such featured articles as "Big Data: From Acquisition to Analysis"; "Total Cost of Ownership Comparison: Oracle Exadata vs. IBM P-Series"; a webinar on Oracle Exadata Database Machine X3; and "Maximum Availability with Oracle GoldenGate." The issue also includes webcasts and podcasts, a featured video, "customer buzz," Oracle Exadata Spotlight, Mobile Resource, and how to find an Oracle Partner.

Oracle's Big Data Page Offers Users Guidance, Insight
Learn Just How Inclusive the Expression 'Big Data' Can Be
Oracle has established the web page Oracle and Big Data: Big Data for the Enterprise. Oracle demonstrates how big data analysis can include not just transactional data but such elements as weblogs, social media, email, sensors -- even photographs. Among the resources available on the Oracle Big Data page are the following:

  • Webcast: Drill Down on Disaster Recovery
  • Oracle Information Architecture: An Architect's Guide to Big Data (PDF)
  • White Paper: Big Data Strategy Guide (PDF)
  • Analyst White Paper: IDC, Oracle's All-Out Assault on the Big Data Market(PDF)
  • White Paper: Oracle: Big Data for the Enterprise (PDF)
Oracle Exadata Gives PayPal 10X Improvement in Processing Speed
60-Day Implementation from Pilot to Operational Status
In a brief webcast Nat Natarajan, PayPal VP Technology Operations, explains how Oracle Exadata enables PayPal to employ Petabyte (PB) scale OLTP operations. He says deployment on Exadata offered 10X improvement in processing speed, 100% availability, and zero downtime during deployment. Implementation was accomplished withing 60 days, he said, from the creation of a pilot to complete use of Exadata in PayPal's business decision making operations.
IT - Storage
10 Rules for Real-Time Data Integration
TDWI December 11, 2012
"According to TDWI's 2011 Next Generation Data Integration survey, the types of data integration functionality that are seeing the hottest adoption and growth today are those forms that involve real-time operation. This includes DI functions that inherently run in real time, such as replication, federation, and event processing. However, ETL and variations of it are also adapting to real-time requirements by executing intraday batches to augment the usual overnight batch processing, plus integrating with message and service buses.

Organizations embracing real-time data integration (RT DI) functionality should develop policies for why and how they’ll use RT DI. The following list of rules can guide the adoption of RT DI..."

To Migrate or Not to Migrate Your Data Warehouse
TDWI December 11, 2012
"When it comes to migrating a data warehouse, resist the temptation to lift-and-shift and do it right. It might take more time upfront, but it'll save you time in the long run..."

"Just how easy is to transition from one data warehouse (DW) platform to another? It depends whom you ask. All of the large relational database vendors have targeted DW migration programs. Ask them about transitioning and you'll likely be told: there's a migration plan for that..."

    A Modern Governance Strategy for Data Disposal
    CIO Insight December 5, 2012
    "Today’s CIOs face a host of complex challenges. Their departments must continually find more efficient ways to store, process and analyze massive (and growing) volumes of incoming data. They need to support globally distributed enterprises, including internal staff, external partners, customers, facilities and other assets around the world. More data in more places also means more risk, as legal, regulatory and privacy obligations increasingly apply to all types of electronic information, including email messages, texts, tweets, phone call records, customer data, blog posts ... the list goes on..."
      By 2020, There Will Be 5,200 GB of Data For Every Person On Earth
      ComputerWorld December 11, 2012
      "During the next eight years, the amount of digital data produced will exceed 40 zettabytes, which is the equivalent of 5,200 GB of data for every man, woman and child on Earth, according to an updated Digital Universe study released today.

      To put it in perspective, 40 zettabytes is 40 trillion gigabytes -- estimated to be 57 times the amount of all the grains of sand on all the beaches on earth. To hit that figure, all data is expected to double every two years through 2020..."

        IT - Technology
        RFID: Befuddled by FUD
        NetworkWorld December 10, 2012
        "Radio-frequency identification (RFID) technology has shown promise as a way to monitor the movement and even the condition of all sorts of objects.

        The advantage of using of radio-frequency electromagnetic fields to transfer data is that, unlike barcode systems, where the tag must be within the line of sight of a reader, RFID tags can be embedded with a tracked object. This can give organizations more flexibility in how they track and identify inventory...

        But RFID has not taken off as people once thought it would. For many prospective RFID users, there has been hesitation due to fear of the unknown."

          10 Gifts for Obscenely Wealthy PC Fanatics
          NetworkWorld December 7, 2012
          Around this time of year, everyone rolls out gift guides—suggestions for what to buy for the special, computer-loving people in your life. But we think that such guides sorely underserve one crucial but oft-ignored demographic: the filthy, stinking rich.

          To remedy this pattern of neglect, we've put together the ultimate gift guide for recipients for whom the word “budget” holds no meaning: Here are 10 pieces of PC paraphernalia with price tags that push the boundaries of rational expense..."

            2012 Robot Review (You Tube Video)
            IDG Connect December 10, 2012
            "Robots often end up as toys or eye candy at trade show booths, but many of them have more noble purposes. We'll show you both in the 2012 robot review..."
              Microsoft, Google, Apple Strive to Define Market for Wearable Computers
              eWeek December 2, 2012
              "Microsoft made news recently when it was reported it has won a patent for glasses that can display a computer image before the user's eyes, but so-called "wearable computers" have been in development for years.

              They're each taking slightly different approaches to the technology, but Microsoft, Google and Apple are among the latest technology companies developing what are called "wearable computers" that display digital images on eyeglass lenses..."

              The Choice You Shouldn't Force Employees to Make
              NetworkWorld December 12, 2012
              "As the old year winds down a sense of hope arises that the hints and inklings of new products and services that have been leaking out over the past months may actually materialize in the New Year. Some of them are products that vendors have solidly promised and assigned release dates to, some are part of vaguely marked road maps and some are simply pipedreams fueled by persistent rumors. Others are services or intriguing situations that could arise. Regardless, here are some of the ones that have caught our eye and that we hope turn out to be as eye catching in reality..."
                Top 5 Developer-Enabling Nuggets in MySQL 5.6
                Blog Post Cites Five Features Worthy of Mention

                There are five so-called developer-friendly nuggets to be found in the forthcoming MySQL 5.6 which Rob Young reviews in a recent post. The buzz on MySQL 5.6 has principally concerned its mass appeal, advanced topics like performance/scale, high availability, and self-healing replication clusters, but Young feels that the five features he blogs about deserve attention as well. They are:

                • Subquery Optimizations
                • Online DDL Operations
                • Key-value access to InnoDB via Memcached API
                • New Instrumentation in Performance Schema
                • Better Condition Handling

                Young discusses each in brief.

                Importing Data from a MySQL Database to Excel using MySQL for Excel
                An Easy-to-use How-to Guide
                There are several standard methods for importing data from a MySQL database to an Excel spreadsheet, Javier Treviño observes but all of them involve some degree of technical knowledge and require the repetition of several steps each time data needs to be imported from a MySQL table to an Excel spreadsheet. He proposes a method that employs MySQL for Excel as an easier alternative. MySQL for Excel, he notes, features an Import MySQL Data action that allows users to import data from a MySQL Table, View or use Stored Procedures literally with a few clicks within Excel.
                MySQL Resource Kit Explains the Pre-eminent Cloud Database
                Register for Access to White Papers, Webinars, Case Studies
                The market for tools to exploit new cloud options grows daily. Bertrand Matthelie recommends MySQL as the ideal database choice for the cloud. He provides a link to the MySQL Resource Kit, where users can register for access to white papers, webinars, case studies and other resources. The link also explains how ISVs rely on MySQL to power their SaaS offerings and offers best practices to deploy the world’s most popular open source database in public and private clouds. Information is included as well on how to leverage MySQL, together with Hadoop and other technologies, to unlock the value of Big Data.
                Cloud Computing
                New Kid in the Cloud: Oracle RightNow CX Cloud Service
                Enhances Customer Experience, Loyalty; Reduces TCO
                There's a new cloud service in town: Oracle RightNow CX Cloud Service with Oracle Engagement Engine Cloud Service. This new release integrates Oracle RightNow Chat Cloud Service with Oracle Engagement Engine Cloud Service to deliver key capabilities designed to help organizations improve customer experiences that will increase customer acquisition and retention, while reducing TCO. Oracle has made significant investments in Oracle RightNow Chat Cloud Service throughout 2012, adding rules-based engagement to existing capabilities such as co-browse, mobile chat, and cross-channel knowledge integration with the contact center, all delivered via the cloud, differentiating Oracle RightNow Chat Cloud Service as the industry-leading chat solution.
                IT - Cloud
                Half of CIOs Don't Test Cloud Security
                HelpNet Security December 6, 2012
                "Researchers from Georgia Tech recently released a study that claims almost all mobile browsers in use in the U.S. fail to accurately notify users whether they are using HTTPS or not...

                World Wide Web Consortium guidelines recommend that all browsers clearly identify the HTTPS status of their current connection. When tested, the Georgia Tech researchers found that the browsers used by 90% of American mobile customers didn't measure up..."

                  10 Cloud Administration Must-Haves You Can't Have Yet
                  IT World December 10, 2012
                  " is possible to make a user interface too easy. Because by making the UI a snap to navigate, using cutesy names in place of standard terms and filling the control panel with bright, shiny objects, you make users think they know what they are doing, even when they have no clue about the consequences of their actions. This goes double for system administrators who may be setting up disaster scenarios at the touch of a button..."
                    The 3 Biggest Threats to Your Cloud Data
                    NetworkWorld December 10, 2012
                    "Any horror movie fan can tell you the scariest threats are the ones you don't see coming, and the same is true when it comes to threats to cloud data. IT has decades of experience protecting on-premise resources. Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises.

                    The risk vectors described here are perhaps the three most dangerous threats to your SaaS data, precisely because so many IT pros aren't prepared for them:"

                    Increasing Cloud Adoption Puts Enterprises at Risk
                    HelpNet Security December 12, 2012
                    "Enterprises are running one-third of their mission-critical applications in the cloud today and expect to have half of all critical applications running in the cloud by 2015, according to SailPoint.

                    In many cases, IT organizations are not fully aware of which cloud applications are in use across the enterprise, which makes it more difficult than ever for enterprises to monitor and control user access to mission-critical applications and data. In fact, only 34% of companies bring IT staff into the vendor selection and planning process when a cloud application is procured without using IT's budget, making it very difficult to proactively address security and compliance requirements for those applications."

                    IT - CxO
                    8 Biggest Myths about Managing Geeks
                    NetworkWorld December 10, 2012
                    "From Sheldon Cooper on "The Big Bang Theory" to Comic Book Guy from "The Simpsons" to Urkel, we know all we need to know about geeks, right?

                    They eat nothing but pizza and care about nothing but technology. They live by night and are rarely seen in daylight. They're barely able to communicate with other bipeds. They'd spend all day playing with their toys and getting nada done if you let them. They're the antithesis of creative..."

                      10 Employee Issues to Watch for This Holiday Season
                      CIO Insight December 11, 2012
                      "With the holiday shopping season fast approaching, the time has come once again for CIOs to worry. Each year, the shopping season arrives and delivers all types of security and productivity-related problems to the average CIO's inbox. Employees spend too much time thinking about holiday shopping while in the office than actually getting their work done. And as CIOs know all too well, the end result is the company’s loss..."
                      Are CIOs Drowning In the Maintenance Pool?
                      Enterprise CIO Forum October 25, 2012
                      "... It took a while to work out the inevitable implementation problems but the process worked. It also forced us to look critically at projects that required excessive costs to maintain in the long term.

                      The lesson I learned from this episode many years ago was that CIOs must be both intentional and vigilant when it comes to maintenance costs, both the dollars and the time. These things creep up on you if you are not careful and you and your organization can quickly drown when they begin consuming an unsustainable portion of your resources..."

                        Tell Me Again Why CEOs Should Tweet
                        The Brainyard December 12, 2012
                        "I follow a handful of big-name CEOs, and I don't get much out of their tweets. And it makes me wonder if tweeting is a waste of time for most CEOs.

                        That's heresy to some. I'm sure it is to one CEO -- Josh James, of business intelligence software startup Domo (whom I also follow). Domo recently published a study with that showed how little time Fortune 500 CEOs spend on social media. The study showed that CEOs at high-growth Inc. 500 companies tweeted far more often, had more Facebook friends and more LinkedIn ties..."

                        IT - DR
                        Disruptive IT Trends That Business Continuity Managers Need To Be Aware Of
                        Continuity Central December 7, 2012
                        "In this article, Ian Kilpatrick describes five trends that may impact data protection strategies during 2013:

                        • BYOD
                        • Mobile device management
                        • High density wireless
                        • Data back-up and recovery
                        • Data leakage protection


                        3 Emerging Technologies That Will Impact Emergency Management
                        Emergency Management December 6, 2012
                        "Emergency Management sought out emerging technologies that will positively impact the field and possibly change how people think tech fits into preparedness, response and recovery."

                        • SimulationDeck
                        • Intellistreets
                        • iDAWG

                        Albert Einstein once said: "The true sign of intelligence is not knowledge but imagination." Who can argue with that, especially when it comes to technology?

                        A Rainy Day Can Have You Rethinking Your Contingency Plans
                        ComputerWorld December 5, 2012
                        "The unprecedented impact of Superstorm Sandy is forcing financial institutions to rethink assumptions about disaster recovery, contingency planning, and the vulnerability of on-premise solutions. And as a result, we may see widespread adoption of cloud-based disaster-recovery solutions in which third party data centers in remote, land-locked locations are relied on to conduct mission-critical technology operations while the client institution itself is handling the disaster..."
                        Damage from Sandy Still Hampering Trading
                        Wall Street & Technology December 12, 2012
                        "It's been more than a month since superstorm Sandy hammered the New York metropolitan area, but the city still isn't back to normal. Sections of the Rockaways on Long Island continue to rebuild and recover. Portions of the Jersey shore are still devastated. PATH train service from New Jersey to lower Manhattan is disrupted, forcing thousands of financial services employees who work in and around the financial district to figure out another way to get to the office.

                        Most surprising, yet unknown to many, is that many buildings in the areas flooded in lower Manhattan remain without power to this day. Yes, some 40-odd days later, some buildings are still waiting to get the lights turned back on..."

                          IT - PM
                          7 Deadly Sins Of Highly Inefficient Project Managers
                 November 19,. 2012
                          "There are many deadly sins that managers can fall prey to if they are not careful, which can be really damaging for the business and for their team – such as failing to give feedback, being overly critical and micromanaging – but project managers in particular can also be in danger of committing the following sins within their role...:"
                            Partner Webcast  Oracle Exadata X3 Database In-Memory Machine
                            Register Now for 20 Dec 2012 Live eSeminar on Next-Generation Technologies Update
                            Log in on Thursday, December 20th at 10:00 a.m. CET (9:00 a.m. GMT) for a free, online live eSeminar devoted to Oracle Exadata X3. Topics covered will include the evolution of Oracle Exadata and the Oracle Exadata X3 Database In-Memory Machine (hardware and software update); review of the unique next-generation technologies underlying Exadata; how to get onboard with Oracle Exadata; and Q&A. Registration is required. Oracle cautions that registrations received less than 24 hours prior to start may not be sufficiently timely to enable receipt of confirmation to attend.
                            IT - Networks
                            If Your Router Is Still Using the Default Password, Change It Now!
                            IT World December 7, 2012
                            "Today I hacked into the routers of several organizations. Actually, it was easy--I just had to type in 'password' ..."

                            "If you didn't change the default password on your router when you set it up, stop reading this and go change it now. Otherwise, you're vulnerable to the most dangerous threat on the internet. Not convinced? You can log into the router of a major university, corporations, and other organizations right now..."

                              IT - Operations
                              How to Prevent Admin Rights Abuse
                              Continuity Central December 7, 2012
                              "It has become axiomatic that financial sector organizations sit at the top end of the scale for security and reputational risk. Banks and finance firms are built on customer data and criminals are drawn to that as surely as are regulators tasked with ensuring companies safeguard it to the required legal standards.

                              Unfortunately, networks are necessarily built from a number of insecure elements, starting with desktop and laptop PCs. A growing theme in this area has been the use of administrator rights to enable not only common everyday software but the legacy applications that are now a fundamental part of modern banking and finance..."

                              IT - Security
                              12 Useful Websites for IT Security
                              NetworkWorld December 5, 2012
                              "Whether dealing with Cisco, Microsoft and VMware-based networks or with open source tools, or perhaps just learning more about IT security, these websites all offer information you may need...:"
                              33 Questions to Ask About Your Company's Security
                              CSO Online December 12, 2012
                              "When's the last time you took a walking tour of your company? Do you have the right security measures in place at each stop? Here's a reminder of where to look (and what you might find) when you get out of your office and into corners of the organization..."
                              Analysis of U.S. Breach Data Finds Reasons For Concern
                              HelpNet Security December 6, 2012
                              "According to the Health Information Trust Alliance’s (HITRUST) analysis of U.S. healthcare data breaches from 2009 to the present, the healthcare industry has made little progress in reducing the number of breaches with troubling statistics seen from the same types of organizations, breaches and locations.

                              The retrospective analysis of breaches affecting 500 or more individuals indicates a slight decline in the total number of breaches during the past three years, but overall the industry’s susceptibility to certain types of breaches has been largely unchanged since breach data became available from the U.S. Department of Health and Human Services (HHS) and the new HIPAA and HITECH Act regulations went into effect..."

                              With BYOD, Data Breaches Just Waiting to Happen
                              NetworkWorld December 12, 2012
                              "Smartphone insecurity means healthcare patient information, for one, remains at high risk, studies find...

                              The healthcare industry's track record on protection of patient data remains disturbingly poor, even after more rigorous federal regulations took effect in 2009, say two recent reports. And it may get worse before it gets better if the industry does not find a better way to protect the patient information carried with smartphones..."

                              10 Nations Facing the Most Pervasive Threats from Malware, Botnets
                              eWeek December 12, 2012
                              "In 2010, Microsoft's chief security strategist Scott Charney called for the private sector and government to treat cyber-crime and other online security problems as issues of Internet health. Calling for a collective defense approach based on the collaboration between public-health organizations, Charney called for Internet service providers and nations to consider quarantining machines with digital infections to safeguard other users. A look at the latest report from antivirus firm Sophos underscores the dangers of not treating Internet security at a national level. In its year-end report, Sophos found that users in southeast Asia were living in the equivalent of a digital hot zone..."
                              2013's Top Security Pain Points: Mobile, APTs, Third-Party Apps
                              IT Business Edge December 12, 2012
                              "The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute and commissioned by Lumension to track endpoint risk, organizational threat strategy and resource availability. In this year's State of the Endpoint Risk study, IT professionals reported the flood of mobile devices entering their corporate networks, advanced persistent threats and third-party application vulnerabilities are their primary pain points moving into 2013. A few short years ago, these concerns barely made the list..."
                                Dexter Malware Infects Point-Of-Sale Systems Worldwide, Researchers Say
                                ComputerWorld December 11, 2012
                                "Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of thousands of payment cards.

                                The malware was dubbed Dexter after a text string found in some of its components and infected Windows-based PoS systems belonging to big-name retailers, hotels, restaurants and even private parking providers, Seculert researchers said Tuesday in a blog post..."

                                ISO Cybersecurity Standard
                                IT Director December 5, 2012
                                "A new ISO standard (SO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity) promises to assist developers with assuring the integrity of online transactions and protect any information (especially personal and financial information) exchanged over the Internet. It should even help web designers to design 'safe' websites that minimise any risk to your computer when browsing websites..."
                                Six Threats to Watch Out For In 2013
                                HelpNet Security December 12, 2012
                                "FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year."

                                • APTs Target Individuals through mobile platforms
                                • Two factor authentication replaces single password sign on security model
                                • Exploits to target Machine-to-Machine (M2M) communications
                                • Exploits circumvent the sandbox
                                • Cross platform botnets
                                • Mobile malware growth closes in on laptop and desktop PCs

                                read on for details...

                                Enterprise Security Testing: What Are You Missing?
                                NetworkWorld December 12, 2012
                                "For all the advances in enterprise networking over the years there's been one big step backward: security testing. Relatively few enterprises today conduct regular security tests in-house, relying instead on occasional tests by outside consultants or, more dangerously, just taking vendor claims at face value.

                                Too often enterprise security testing takes one of two paths, neither satisfactory..."

                                Huge GPU Cluster Makes Password Hacking A Breeze
                                HelpNet Security December 6, 2012
                                "Cracking encrypted passwords is getting increasingly easier as researchers come up with new ways of harnessing CPU, GPU and cloud power to perform the task.

                                The latest of the improvements in this particular research brach comes from Jeremi Gosney (aka epixoip), who at the Passwords^12 conference held earlier this month in Oslo, Norway, shared with the attendees his latest achievement: a cluster of five 4U servers and 25 graphic cards that go through 180 billion MD5 hashes per second.."

                                Kaspersky Study Finds Huge Security-Knowledge Gap Among IT Pros
                                CSO Online November 29, 2012
                                "New research from Kaspersky Lab finds almost 1/3 of IT professionals lack basic understanding of common security threats. Yet, most have security top of mind for their organization. Where's the disconnect?"
                                IT - Careers
                                Don't Jeopardize Your Job at the Holiday Party
                                Baseline December 5, 2012
                                "Is your company having a holiday party? Then count your blessings because more than half of organizations are ditching the holiday event this year, according to a recent survey from OfficeTeam. In many cases, that decision is based on the desire to remain frugal in light of today's economic uncertainty, rather than on a Grinch-like mentality..."
                                  IT, Terrorists and My DMV
                                  CIO Insight December 10, 2012
                                  "...My driver’s license was up for renewal, so I dutifully marched into a local DMV office to submit the renewal form and a check in order to obtain my new license. I haven’t had any tickets or collisions, let alone committed any crimes, during the last eight years.

                                  When I stepped to the counter, the clerk reviewed my paperwork and asked for a birth certificate or U.S. passport to validate my identity. Huh? I thought the previous driver's license was considered adequate proof...."

                                    Six Technology Jobs Will Be Hot In 2013
                                    IT World Canada December 11, 2012
                                    "If you're a network engineer or a mobile application designer you're among a group of people whose talent will be in demand, says a staffing firm. It’s nice to be in demand. For one thing, it’s good for the ego. For another, it’s great for the pocketbook.

                                    According to Robert Half Technology, people in the following IT-related positions will hold the hottest technology jobs in Canada in the coming year..."

                                      IT - Social Media
                                      7 Strategies to Meld Social with Business Process
                                      InformationWeek December 7, 2012
                                      "Businesses consider integration of social technologies with business processes to be important, but only about one-third of them expect social to be integrated across the business in the next two years, according to a study by AIIM, a global community of information professionals. The study, 'Industry Watch: Social in the Flow,' found that security issues, higher-priority initiatives and 'no clear financial benefit' were the top three barriers to integrating social techniques..."
                                      IT - Virtualization
                                      TPC Kicks Out Quick-And-Dirty Virty Server Test
                                      The Register December 13, 2012
                                      "For the past two and a half years, the members of the Transaction Processing Council consortium, which creates and audits transaction processing and data warehousing benchmarks for systems, has been working on a virtualization benchmark. The new test, called TPC-VMS, has finally made it out of committee and is ready for use..."
                                      IT - Compliance
                                      Hauling That 50-Pound Sack of Compliance
                                      Dark Reading December 11, 2012
                                      "Done wrong, your compliance efforts can needlessly weigh your team down"

                                      "A business owner recently told me she was aware her business had done little toward necessary HIPAA compliance. She had reasons, of course. The economy was making business difficult, they were short on cash for extra projects, their profit margins were too small, and the staff was spread too thin to take on any new tasks or projects..."

                                      Tweeting Bankers Warned: U Better Not Mislead Customers
                                      The Register December 12, 2012
                                      "Banks must remember regulatory compliance issues when interacting with customers via Twitter, says an expert.

                                      Banks face regulatory risks when responding to customers through social media channels, a legal expert has said.

                                      A new study by Virgin Media Business has revealed that 63 per cent of banks now respond to customer complaints and queries received through Twitter within an hour.

                                      Technology law specialist Luke Scanlon of Pinsent Masons, the law firm behind, said that the firms that do so should have a properly thought-through strategy for communicating through Twitter speedily..."

                                        UK CIOs See EU Regulation as Key
                                        ComputerWeekly December 10, 2012
                                        "A third of UK CIOs are more concerned with EU regulation – such as the data protection directive – than their own local laws, a study has revealed.

                                        Some 34% of UK CIOs and 30% across Europe regard EU regulation as more important than local country laws, according to a survey of 400 CIOs by Forrester Consulting in eight European countries."

                                        The research report said: "While organisations should be aware of the financial impact of ignoring compliance, the real danger is loss of reputation."

                                          IT - Email
                                          Email Is So Last Century
                                          The Register December 12, 2012
                                          "Over the course of the past year or two we have started to hear that email is becoming less relevant in this era of social networking.

                                          With websites such as Facebook grabbing the world’s attention and organisations encouraged to communicate with all and sundry via sites such as Twitter and LinkedIn, many are seriously questioning the importance of email in everyday business activities.

                                          Despite the rhetoric from social networking enthusiasts, however, it will come as little surprise to any IT professional that email continues to be widely deployed in the vast majority of organisations..."

                                          Workers can't (or Won't) Escape from Their eMail
                                          Baseline December 6, 2012
                                          "Do you sometimes feel as if you're perpetually buried inside your inbox? Join the club. Despite the massive popularity of social media, we spend a staggering amount of hours sorting, reading and sending email, according to a recent survey from Mimecast..."
                                            It Pays To Study the Habits of Your Email Users
                                            The Register December 13, 2012
                                            "How many email messages do you receive in the average working day: 20? 30? 50? More? And what volume of email have you accumulated over the past year: half a gig, a gig, two gigs?

                                            Whatever the exact amount, it is safe to say that most of us have to deal with a lot of email traffic and that an increasing proportion of it comes with chunky attachments. This raises the question of what we do with all these messages after we have read them, particularly those relating to projects, customer interactions and so on that really need to be kept for reference or regulatory purposes..."

                                              Replication and Cloning Software Licenses No Longer Mandatory with Sun ZFS Backup Appliance.
                                              Still Available as Options on New Sun ZFS Backup Appliance Quotes

                                              As of December 4, 2012, important product software changes took effect for the Sun ZFS Backup Appliance. It is now the case that replication and cloning software licenses are no longer mandatory purchases with Sun ZFS Backup Appliance, though both license types are still available as optional additions on new Sun ZFS Backup Appliance quotes or as additions to existing systems.

                                              IT - Big Data
                                              Big Data Analytics Set To Confound Conventional Adoption Curve in UK
                                              ComputerWeekly December 10, 2012
                                              "Four leading executives from US big data and analytics companies tell a similar story of imminent increased big data analytics adoption in the UK and Europe. Senior executives from MapR, Cloudera, ParAccel, and Pentaho traced out the likely pattern of growth in 2013 in a series of interviews with Computer Weekly."
                                              Don't Get 'Ha-Duped' By Big Data Security Products
                                              Dark Reading December 12, 2012
                                              "A couple of posts back I posed the question, "How do you secure big data environments?" I covered several avenues of attack against NoSQL environments that I considered low-hanging fruit from a security standpoint. To address those attacks, I offer the following recommendations to provide basic cluster security.

                                              But before I make any recommendations to securing NoSQL, I have a couple of requirements for security solutions in big data environments ..."

                                              How to Hire a Qualified Data Scientist
                                              Big Data Republic December 6, 2012
                                              "By revealing market trends, patterns, and other indicators hidden deep inside big data, data scientists can help enterprises create opportunities, maximize revenue, and stay a step ahead of their competitors. How do you get your hands on one?"
                                              IT Departments Battle for Data Analytics Talent
                                              NetworkWorld December 12, 2012
                                              "Few areas of the IT job market have seen the growth and disparity in supply and demand that the data analytics field has experienced. As big data continues to get bigger and the analytics field continues to mature, it's becoming a core part of business and the decision-making process. Competition for top analytic talent is going to be fierce as more companies enter the hiring fray.

                                              In a report on big data, the McKinsey Global Institute predicts that by 2018, the U.S. will be facing a massive shortage of analytics personnel..."

                                              Making Big Data Smaller
                                              IT World December 12,2012
                                              "MIT researchers develop a new approach to working with big data: reduce it to a size that can be managed and analyzed with conventional tools..."

                                              "The value of big data is no longer a secret to most companies. The main problem with big data, though, is that it’s, well, big. That is, the volume of data that companies would like to understand is so large and coming so fast that just organizing, manipulating and analyzing it is a problem and, sometimes, prohibitive. Conventional relational databases often can’t handle today’s big data, or can’t process them in a reasonable amount of time..."

                                              IT - Mobile
                                              GA. Tech Researchers: Mobile Browsers Need Better HTTPS Indicators
                                              NetworkWorld December 5, 2012
                                              "Researchers from Georgia Tech recently released a study that claims almost all mobile browsers in use in the U.S. fail to accurately notify users whether they are using HTTPS or not...

                                              World Wide Web Consortium guidelines recommend that all browsers clearly identify the HTTPS status of their current connection. When tested, the Georgia Tech researchers found that the browsers used by 90% of American mobile customers didn't measure up..."

                                                Guess What? Your Employees Don't Care What You Say
                                                CIO Insight December 11, 2012
                                                "... Employees who use their own devices tend to work more and be more productive. Plus, the cost of acquiring new hardware--long a drain on IT budgets--has dropped. However, with freedom comes trouble. Despite the IT's best efforts at keeping employees restricted to certain services, employees are not listening to CIOs, according to a new study from enterprise storage provider Nasuni. In fact, whenever employees are limited to certain services, they usually find ways to get around the policy. It's a major issue in the workplace for CIOs..."
                                                  How To Conduct A Strategic Review Of Your Mobile Policy
                                                  ComputerWeekly December 12, 2012
                                                  "A few short years ago, managing mobile devices was a relatively straightforward task of applying control to a number of corporate laptops allocated to relatively trusted individuals.

                                                  True, the devices were only intermittently connected, but otherwise the challenge operated within tightly defined boundaries.

                                                  Today, a diversity of platforms, a wide spectrum of users and employees increasingly bringing their own device in preference or as an alternative to a corporate offering means the challenge of mobile device management (MDM) has escalated significantly..."

                                                  IT - BYOD
                                                  4 Steps to Build A BYOD Business Case
                                                  InformationWeek December 5, 2012
                                                  "The rise of the anytime, anywhere information workplace is in full swing. Results from Forrester's Q2 2012 Forrsights Workforce Employee Survey show that more than two-thirds of North American and European information workers (i.e., workers who use a computer for work an hour or more per day) personally choose the smartphones or tablets they use for work, and 46% of information workers personally choose work laptops that are not on the company-approved device list. To address this increasingly complex mobile device landscape, more than half of companies Forrester surveyed across these regions are deploying bring-your-own-device (BYOD) programs to support devices including smartphones, tablets, laptops or desktops..."
                                                  Can HYOD Replace BYOD?
                                                  NetworkWorld December 10, 2012
                                                  "... bring your own device (BYOD) approach compared to the "here is your own device" (HYOD) approach. The BYOD wave has been a nightmare for many a security and IT admin for years. With no control over what devices are accessing the network, we have no control over how data may be viewed and used. We have little-to-no control over the security of these usually mobile devices..."
                                                  Reject BYOD for the Right Reasons, Not Out of Fear
                                                  Internet Evolution December 4, 2012
                                                  "The British Broadcasting Company (BBC) in a recent interview said it would not allow employees to bring their own devices onto work networks as it 'does not like to be at the bleeding edge [of technology].'

                                                  Other companies may share that same sort of luddite sentiment to varying degrees, although they likely would be a little less blunt in their mea culpas regarding bring your own device (BYOD) policy. But if companies are truly shying away from BYOD for fear of adopting an unproven technology, they may face image damage -- an unfortunate side effect of making a rational choice for irrational reasons..."

                                                  Security Issues Pose Hurdles for BYOD Migration
                                                  eWeek December 5, 2012
                                                  "Privacy and access controls should be implemented to ensure the security of corporate data as well as protect personal information stored on user-owned devices.

                                                  The consumerization of IT and the increasing popularity of bring-your-own-device initiatives is changing the way businesses work, but there are several security issues organizations need to keep in mind when implementing a BYOD program, according to a study by IT research firm Gartner..."

                                                  Top 10 Consumerization and BYOD Tips of 2012
                                                  Search Consumerization December 7, 2012
                                                  "IT professionals had a lot of consumer technology to keep tabs on this year.

                                                  New mobile devices and operating systems from Apple, Google and Microsoft put the bring your own device (BYOD) phenomenon in the spotlight. We also saw important advancements in the cloud storage and file-sharing market, the other main area of concern when it comes to the consumerization of IT.

                                                  Assessing the benefits and risks of consumer technology in the enterprise has never been easy, and the events of 2012 didn't help that cause. Fortunately, our expert contributors spent the year staying on top of new developments and sharing their consumerization and BYOD tips with readers.

                                                  Here are the year's 10 most popular:"

                                                  Top Ten Articles for last few Issues
                                                  Vol 178; Vol 177 Issues 1, 2, 3 and 4; Vol 176 Issues 3, 4 and 5
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • Oracle Special Edition eBooks - Cloud Architecture & Enterprise Cloud
                                                  • OS-Level Virtualization with Oracle Solaris Zones and Linux Containers
                                                  • Now Developers Can Use Java for Both iOS and Android Devices
                                                  • Triumph and disaster: Two migrations to OpenOffice
                                                  • MySQL and Hadoop: Guide to Big Data Integration
                                                  • Three MySQL December Webinars
                                                  • Second Generation Oracle Exalogic Elastic Cloud Released
                                                  • Oracle, LexisNexis Combine to Provide Powerful Defense Against Fraud and Identity Abuse
                                                  • Understanding Oracle Strategy, the Oracle Cloud and Oracle Engineered Systems
                                                  • Java Spotlight Episode 111: Bruno Souza and Fabiane Nardon on StoryTroop

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Encryption
                                                    Hackers Encrypt Medical Centre's Patient Data, Ask for Ransom
                                                    HelpNet Security December 10, 2012
                                                    "Russian hackers have apparently managed to break into a server where an Australian medical centre keeps its patients' records, encrypt the data, and are now asking for 4,000 Australian dollars in order to decrypt it and make it available for use again, ABC News reports..."
                                                      IT - Server
                                                      5 Sysadmin Holiday Survival Tips
                                                      Enterprise Systems Journal December 12, 2012
                                                      "Systems administrators are already dreading the inevitable holiday tradition of receiving an 'emergency' phone call from the office workaholic, typically right as the festivities are about to begin. Often the remedies for these 'emergencies' are as simple as locating a lost file or folder, but sometimes these workaholics manage to bring down a critical system. Either way, an IT-related interruption to holiday fun can really put a damper on a sysadmin's spirit. Here are five tips to help sysadmins survive the holiday season with their spirits intact:.."
                                                        13 Things That a Unix Sysadmin Will Never Do
                                                        IT World December 9, 2012
                                                        "Unix systems administrators are an odd lot. We generally love doing somersaults on the command line and we don't like sharing the power, often not even with other sysadmins. We know how special we are just because most of the people we interact with can barely understand the words that we use. At the same time, we generally have work ethics that reveal a deep respect for the systems we manage and the people who use them -- or, at least, for their success in getting their work done on our servers.

                                                        So here's a list of 13 things that Unix admins just won't do...:"

                                                        Top 3 Trends in Server I/O: A Look Back, the Road Ahead
                                                        Enterprise Systems Journal December 12, 2012
                                                        "In 2012, we saw major updates to server platforms, but in light of massive core upgrades and more memory capacity than applications can really take advantage of, why are we still being held back by I/O? Even with PCIe Gen 3 now hitting the server market, people are starting to see that I/O just isn't keeping pace with the other platform updates. Maybe the problem isn't inside the server. Maybe the future is in view if we just think outside the box..."
                                                          LibreOffice 3.6.4 for Windows, MacOS and Linux
                                                          Improving the overall quality and stability
                                                          The Document Foundation (TDF) has released LibreOffice 3.6.4, for Windows, MacOS and Linux. This release is another step forward in the process of improving the overall quality and stability for any kind of deployment, on personal desktops or inside organizations and companies of any size.

                                                          LibreOffice 3.6.4 arrives a couple of weeks after the successful LiMux HackFest, where more than 30 developers have gathered to hack LibreOffice code and work on features and patches. One result is this video by Peter Baumgarten and Christian Lohmeier, showing how easy it is to build LibreOffice on your own to get involved in the project.

                                                          Trending in
                                                          Vol 235, Issue 3
                                                          Trending IT Articles